Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
-35% $32.39$32.39
Ships from: Amazon.com Sold by: Amazon.com
$30.45$30.45
Ships from: Amazon Sold by: 2nd Life Aloha
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
OK
Hacking Connected Cars: Tactics, Techniques, and Procedures 1st Edition
Purchase options and add-ons
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.
Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.
- Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide
- Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability
- Conduct penetration testing using the same tactics, techniques, and procedures used by hackers
From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
- ISBN-101119491800
- ISBN-13978-1119491804
- Edition1st
- PublisherWiley
- Publication dateMarch 17, 2020
- LanguageEnglish
- Dimensions7.38 x 0.62 x 9.25 inches
- Print length272 pages
Frequently bought together
Similar items that may deliver to you quickly
Editorial Reviews
About the Author
Alissa is the Group CEO of Brier & Thorn and is also the managing partner at Knight Ink, where she blends hacking with content creation of written and visual content for challenger brands and market leaders in cybersecurity. As a serial entrepreneur, Alissa was the CEO of Applied Watch and Netstream, companies she sold in M&A transactions to publicly traded companies in international markets.
Her passion professionally is meeting and learning from extraordinary leaders around the world and sharing her views on the disruptive forces reshaping global markets. Alissa's long-term goal is to help as many organizations as possible develop and execute on their strategic plans and focus on their areas of increased risk, bridging silos to effectively manage risk across organizational boundaries, and enable them to pursue intelligent risk taking as a means to long-term value creation. You can learn more about Alissa on her homepage at http: //www.alissaknight.com, connect with her on LinkedIn, or follow her on Twitter @alissaknight.
Product details
- Publisher : Wiley; 1st edition (March 17, 2020)
- Language : English
- Paperback : 272 pages
- ISBN-10 : 1119491800
- ISBN-13 : 978-1119491804
- Item Weight : 1 pounds
- Dimensions : 7.38 x 0.62 x 9.25 inches
- Best Sellers Rank: #321,026 in Books (See Top 100 in Books)
- #86 in Computer Cryptography
- #97 in Web Encryption
- #215 in Computer Hacking
- Customer Reviews:
About the author
I blend influencer marketing, content creation in writing and video production, go-to market strategies, and strategic planning for telling brand stories at scale in cybersecurity. I achieve this through ideation to execution of content strategy, storytelling, and execution of influencer marketing strategies that take cybersecurity buyers through a brand’s custom curated journey to attract and retain them as long-term partners. I'm a published author, having published the first book on hacking connected cars and am working on a new series of books into hacking and securing APIs and microservices.
I've worked as an industry analyst, blending primary and secondary market research into industry reports that takes apart the latest technologies in cybersecurity to advise clients on how, why, and where contemporary security controls can be applied to lower their areas of increased risk for long-term valuation creation.
I also sit as the Chief Marketing Officer responsible for sales and marketing at for Brier & Thorn Group. Previously, I was the CEO of Applied Watch and Netstream; companies I sold in M&A transactions to publicly traded companies in international markets.
My passion professionally is meeting and learning from extraordinary leaders around the world and sharing my views on the disruptive forces reshaping global markets. My long-term goal is to help as many organizations as possible develop and execute on their strategic plans and focus on their areas of increased risk; bridging silos to effectively manage risk across organizational boundaries; and enable them to pursue intelligent risk taking as a means to long-term value creation.
Check out the conferences I'll be speaking at and view my latest content calendar at http://www.alissaknight.com and visit my YouTube channel at http://www.youtube.com/c/alissaknight for more great content!
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Reviewed in the United States on September 2, 2022
1) Creating a Rogue BTS (Base Transceiver Station) (p. 108) for intercepting cell traffic to the vehicle
(***within the legal limits specified on p.112***)
2) Performing an Evil Twin Attack on the In-Vehicle Wifi Network (p.91)
3) Using BtleJuice to MITM the Vehicle Bluetooth interface (p.102)
Also very relevant to me were the sections on threat modeling, threat analysis, and how to communicate risk appropriately to an OEM. I do threat modeling regularly at my job and this book expanded my knowledge base on it.
All in all, this was an excellent book that disseminates Alissa Knight's 10+ years of expertise in pen testing connected vehicles. I will definitely recommend it to the team that I work with.
The level of detail and research is very useful for those interested in the security field.
i highly recommend this author as an source for information and subject matter expect!!!!!
Top reviews from other countries
Reviewed in Canada on December 2, 2022
Reviewed in the United Kingdom on March 9, 2024
Written very well, it flows quickly despite being a concentrate of technicalities for professionals. Brilliant and comprehensive approach to matter.
Best reading 2020 !!
I would say "A must have for Automotive Engineers and Security Learners "